MDKSA-2000:027-1

Problem description

Previous versions of Netscape, from version 3.0 to 4.73 contain a
serious overflow flaw due to improper input verification in Netscape's
JPEG processing code. The way Netscape processed JPEG comments trusted
the length parameter for comment fields. By manipulating this value,
it was possible to cause Netscape to read in an excessive amount of
data which would then overwrite memory. Data with a malicious design
could allow a remote site to execute arbitrary code as the user of
Netscape on the client system. It is highly recommended that everyone
using Netscape upgrade to this latest version that fixes the flaw.
Update:
The md5sums listed in the previous advisory are no longer valid. We
are using the same RPM packages for 6.0, 6.1, and 7.0 so the md5ums
have changed. The package for 7.1 has also been updated to incorporate
many of the enhancements used in Linux-Mandrake 7.1